This registry can be accessed through proxies that run on each node listening on port 5000. We send the proxy images to the nodes directly to avoid requests that hit the network during cluster launch. For now, we continue to pull the registry itself over the network, especially given its large size (we should be able to dramatically shrink the image). On GCE we create a PD and use that for storage, otherwise we use an emptyDir. The registry is not enabled outside of GCE. All communication is currently plain HTTP. In order to use SSL, we will need to be able to request a certificate/key from the apiserver signed by the apiserver's CA cert.
154 lines
6.1 KiB
Bash
Executable File
154 lines
6.1 KiB
Bash
Executable File
#!/bin/bash
|
|
|
|
# Copyright 2015 The Kubernetes Authors All rights reserved.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
# A library of helper functions and constant for coreos os distro
|
|
|
|
# $1: if 'true', we're building a master yaml, else a node
|
|
function build-kube-env {
|
|
local master=$1
|
|
local file=$2
|
|
|
|
rm -f ${file}
|
|
# TODO(dawnchen): master node is still running with debian image
|
|
if [[ "${master}" == "true" ]]; then
|
|
cat >$file <<EOF
|
|
KUBERNETES_MASTER: "true"
|
|
ENV_TIMESTAMP: $(yaml-quote $(date -u +%Y-%m-%dT%T%z))
|
|
INSTANCE_PREFIX: $(yaml-quote ${INSTANCE_PREFIX})
|
|
NODE_INSTANCE_PREFIX: $(yaml-quote ${NODE_INSTANCE_PREFIX})
|
|
CLUSTER_IP_RANGE: $(yaml-quote ${CLUSTER_IP_RANGE:-10.244.0.0/16})
|
|
SERVER_BINARY_TAR_URL: $(yaml-quote ${SERVER_BINARY_TAR_URL})
|
|
SERVER_BINARY_TAR_HASH: $(yaml-quote ${SERVER_BINARY_TAR_HASH})
|
|
SALT_TAR_URL: $(yaml-quote ${SALT_TAR_URL})
|
|
SALT_TAR_HASH: $(yaml-quote ${SALT_TAR_HASH})
|
|
SERVICE_CLUSTER_IP_RANGE: $(yaml-quote ${SERVICE_CLUSTER_IP_RANGE})
|
|
ALLOCATE_NODE_CIDRS: $(yaml-quote ${ALLOCATE_NODE_CIDRS:-false})
|
|
ENABLE_CLUSTER_MONITORING: $(yaml-quote ${ENABLE_CLUSTER_MONITORING:-none})
|
|
ENABLE_CLUSTER_LOGGING: $(yaml-quote ${ENABLE_CLUSTER_LOGGING:-false})
|
|
ENABLE_CLUSTER_UI: $(yaml-quote ${ENABLE_CLUSTER_UI:-false})
|
|
ENABLE_NODE_LOGGING: $(yaml-quote ${ENABLE_NODE_LOGGING:-false})
|
|
LOGGING_DESTINATION: $(yaml-quote ${LOGGING_DESTINATION:-})
|
|
ELASTICSEARCH_LOGGING_REPLICAS: $(yaml-quote ${ELASTICSEARCH_LOGGING_REPLICAS:-})
|
|
ENABLE_CLUSTER_DNS: $(yaml-quote ${ENABLE_CLUSTER_DNS:-false})
|
|
ENABLE_CLUSTER_REGISTRY: $(yaml-quote ${ENABLE_CLUSTER_REGISTRY:-false})
|
|
DNS_REPLICAS: $(yaml-quote ${DNS_REPLICAS:-})
|
|
DNS_SERVER_IP: $(yaml-quote ${DNS_SERVER_IP:-})
|
|
DNS_DOMAIN: $(yaml-quote ${DNS_DOMAIN:-})
|
|
KUBE_USER: $(yaml-quote ${KUBE_USER})
|
|
KUBE_PASSWORD: $(yaml-quote ${KUBE_PASSWORD})
|
|
KUBE_BEARER_TOKEN: $(yaml-quote ${KUBE_BEARER_TOKEN})
|
|
KUBELET_TOKEN: $(yaml-quote ${KUBELET_TOKEN:-})
|
|
KUBE_PROXY_TOKEN: $(yaml-quote ${KUBE_PROXY_TOKEN:-})
|
|
ADMISSION_CONTROL: $(yaml-quote ${ADMISSION_CONTROL:-})
|
|
MASTER_IP_RANGE: $(yaml-quote ${MASTER_IP_RANGE})
|
|
KUBERNETES_MASTER_NAME: $(yaml-quote ${MASTER_NAME})
|
|
KUBERNETES_CONTAINER_RUNTIME: $(yaml-quote ${CONTAINER_RUNTIME})
|
|
RKT_VERSION: $(yaml-quote ${RKT_VERSION})
|
|
CA_CERT: $(yaml-quote ${CA_CERT_BASE64})
|
|
MASTER_CERT: $(yaml-quote ${MASTER_CERT_BASE64:-})
|
|
MASTER_KEY: $(yaml-quote ${MASTER_KEY_BASE64:-})
|
|
KUBELET_CERT: $(yaml-quote ${KUBELET_CERT_BASE64:-})
|
|
KUBELET_KEY: $(yaml-quote ${KUBELET_KEY_BASE64:-})
|
|
KUBECFG_CERT: $(yaml-quote ${KUBECFG_CERT_BASE64:-})
|
|
KUBECFG_KEY: $(yaml-quote ${KUBECFG_KEY_BASE64:-})
|
|
KUBELET_APISERVER: $(yaml-quote ${KUBELET_APISERVER:-})
|
|
EOF
|
|
else
|
|
cat >>$file <<EOF
|
|
KUBERNETES_MASTER="false"
|
|
ENV_TIMESTAMP=$(date -u +%Y-%m-%dT%T%z)
|
|
INSTANCE_PREFIX=${INSTANCE_PREFIX}
|
|
NODE_INSTANCE_PREFIX=${NODE_INSTANCE_PREFIX}
|
|
SERVER_BINARY_TAR_URL=${SERVER_BINARY_TAR_URL}
|
|
SERVICE_CLUSTER_IP_RANGE=${SERVICE_CLUSTER_IP_RANGE}
|
|
ENABLE_CLUSTER_MONITORING=${ENABLE_CLUSTER_MONITORING:-none}
|
|
ENABLE_CLUSTER_LOGGING=${ENABLE_CLUSTER_LOGGING:-false}
|
|
ENABLE_CLUSTER_UI=${ENABLE_CLUSTER_UI:-false}
|
|
ENABLE_NODE_LOGGING=${ENABLE_NODE_LOGGING:-false}
|
|
LOGGING_DESTINATION=${LOGGING_DESTINATION:-}
|
|
ELASTICSEARCH_LOGGING_REPLICAS=${ELASTICSEARCH_LOGGING_REPLICAS:-}
|
|
ENABLE_CLUSTER_DNS=${ENABLE_CLUSTER_DNS:-false}
|
|
ENABLE_CLUSTER_REGISTRY=${ENABLE_CLUSTER_REGISTRY:-false})
|
|
DNS_REPLICAS=${DNS_REPLICAS:-}
|
|
DNS_SERVER_IP=${DNS_SERVER_IP:-}
|
|
DNS_DOMAIN=${DNS_DOMAIN:-}
|
|
KUBELET_TOKEN=${KUBELET_TOKEN:-}
|
|
KUBE_PROXY_TOKEN=${KUBE_PROXY_TOKEN:-}
|
|
ADMISSION_CONTROL=${ADMISSION_CONTROL:-}
|
|
MASTER_IP_RANGE=${MASTER_IP_RANGE}
|
|
KUBERNETES_MASTER_NAME=${MASTER_NAME}
|
|
ZONE=${ZONE}
|
|
EXTRA_DOCKER_OPTS=${EXTRA_DOCKER_OPTS:-}
|
|
PROJECT_ID=${PROJECT}
|
|
KUBERNETES_CONTAINER_RUNTIME=${CONTAINER_RUNTIME}
|
|
RKT_VERSION=${RKT_VERSION}
|
|
CA_CERT=${CA_CERT_BASE64}
|
|
KUBELET_CERT=${KUBELET_CERT_BASE64:-}
|
|
KUBELET_KEY=${KUBELET_KEY_BASE64:-}
|
|
EOF
|
|
fi
|
|
}
|
|
|
|
# create-master-instance creates the master instance. If called with
|
|
# an argument, the argument is used as the name to a reserved IP
|
|
# address for the master. (In the case of upgrade/repair, we re-use
|
|
# the same IP.)
|
|
#
|
|
# It requires a whole slew of assumed variables, partially due to to
|
|
# the call to write-master-env. Listing them would be rather
|
|
# futile. Instead, we list the required calls to ensure any additional
|
|
# variables are set:
|
|
# ensure-temp-dir
|
|
# detect-project
|
|
# get-bearer-token
|
|
#
|
|
# TODO(dawnchen): Convert master node to use coreos image too
|
|
function create-master-instance {
|
|
local address_opt=""
|
|
[[ -n ${1:-} ]] && address_opt="--address ${1}"
|
|
|
|
write-master-env
|
|
gcloud compute instances create "${MASTER_NAME}" \
|
|
${address_opt} \
|
|
--project "${PROJECT}" \
|
|
--zone "${ZONE}" \
|
|
--machine-type "${MASTER_SIZE}" \
|
|
--image-project="${MASTER_IMAGE_PROJECT}" \
|
|
--image "${MASTER_IMAGE}" \
|
|
--tags "${MASTER_TAG}" \
|
|
--network "${NETWORK}" \
|
|
--scopes "storage-ro,compute-rw,logging-write" \
|
|
--can-ip-forward \
|
|
--metadata-from-file \
|
|
"startup-script=${KUBE_ROOT}/cluster/gce/configure-vm.sh,kube-env=${KUBE_TEMP}/master-kube-env.yaml" \
|
|
--disk "name=${MASTER_NAME}-pd,device-name=master-pd,mode=rw,boot=no,auto-delete=no"
|
|
}
|
|
|
|
# TODO(dawnchen): Check $CONTAINER_RUNTIME to decide which
|
|
# cloud_config yaml file should be passed
|
|
# TODO(mbforbes): Make $1 required.
|
|
# TODO(mbforbes): Document required vars (for this and call chain).
|
|
# $1 version
|
|
function create-node-instance-template {
|
|
local suffix=""
|
|
if [[ -n ${1:-} ]]; then
|
|
suffix="-${1}"
|
|
fi
|
|
create-node-template "${NODE_INSTANCE_PREFIX}-template${suffix}" "${scope_flags}" \
|
|
"kube-env=${KUBE_TEMP}/node-kube-env.yaml" \
|
|
"user-data=${KUBE_ROOT}/cluster/gce/coreos/node.yaml"
|
|
}
|